1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
4 years ago
8

What question for attack libraries help answer?

Computers and Technology
1 answer:
ch4aika [34]4 years ago
6 0

Threat modellers should always look at threat modeling as a 4-step framework that should make sure that a system is safe. This 4-step framework consist of four questions that developers and threat modellers need to ask themselves


A: What are you building?

This is the first step in the 4-step framework. The threat modellers should figure out what they are building. By default, all software development projects consist of specifications and different types of documents. One of the simplest ways of getting an overview is by creating visual models of the system. By taking a look at such diagrams, the threat modellers should be able to get an idea of how extensive the system looks.


B: What can go wrong?

According to some practitioners, it is right to suggest a more detailed list of what can go wrong, instead of using STRIDE. STRIDE is too high level and abstract. Once we’ve looked at different models of the system, the threat modellers should be able to find possible attack patterns that may be a threat against the system.


C: What are you going to do about it or what should you do about those things that can go wrong?

This step consists of deciding what to do with every threat. It is in this step that the developers or the threat modellers need to make a calculated decision on which attacks to mitigate, and which attacks are hard to execute, so obscure, or not that damaging to the system. This step is where threats need to be addressed.


D: Did you do it right or did you do a decent job of analysis? After all possible threats have been considered as not damaging, it is time to re-evaluate the system design and implementation. Threat modeling is considered to be an iterative process. If the validation of a system fails, then the whole process needs to jump back to the first or the second step.




You might be interested in
To have a set of command
GalinKa [24]

Every program that interacts with people responds to a specific set of commands. The set of commands and the syntax for entering them is called the user interface and varies from one program to another. The DOS operating system makes a distinction between internal and external commands.

3 0
3 years ago
What is the full form of ms-word?​
Alex

Answer:

microsoft word

Explanation:

i got certified on it sooooooooooo...

6 0
3 years ago
Read 2 more answers
The relational operators have the property of _____; that is, the use of relational algebra operators on existing relations (tab
hram777 [196]

Answer:

Closure

Explanation:

The relational operators have the property of closure ; that is, the use of relational algebra operators on existing relations (tables) produces new relations.

3 0
3 years ago
Sam has created a fashion website. There are many subscribers to his website. He has added new blogs, pictures, and articles abo
marusya05 [52]

Answer:

Post advertisements on social media and message the subscribers.

Explanation:

There is no point in not promoting and putting forward the work that he has been doing. All of the given options are about promoting the content but Sam needs to choose the ones which are efficient and seem professional as well.

Posting advertisements about the website promotes the content on a wider base and helps in luring more and more people to the website.

Messaging or sending an email to the subscribers is a healthy of letting the subscribers about the updates and latest posts.

8 0
4 years ago
What groups have developed electrode idenfication systems?
Basile [38]

CH24. CH25. CH26. CH27. CH28. CH29. CH30. CH31.

5 0
4 years ago
Other questions:
  • You listened to a song on your computer. Did you use hardware, software, or both?
    11·2 answers
  • The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels th
    14·2 answers
  • Which software application should be used to communicate in writing about an upcoming event?
    12·2 answers
  • In Word, a red wavy underline indicates a/an
    15·1 answer
  • A _____ is a basic element that refers to the continuous movement of a point along a surface, such as by a pencil or brush a typ
    9·1 answer
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • Memory is the place of the computer where data and instructions are stored either permanently or temporarily. True or false.​
    11·1 answer
  • What is the easiest way to beat all of the fnaf games without getting killed and beating all of the nights?
    8·2 answers
  • Both computers and people handle information using which processes?
    8·1 answer
  • Which of the following is true about named ranges?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!